Skip to main content

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography.

Project description

Steg

Ochrona

Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) steganography. Current supported image formats include PNG, TIFF, BMP, and ICO. Steg also includes a command line tool for quick hiding and extraction.

Installation

$ pip install steg

Usage in Code

# Import library
from steg import steg_img

# Hiding
# Select your payload and carrier files
s = steg_img.IMG(payload_path=<payload path>, image_path=<carrier path>)
# Create a new image containing your payload
s.hide()

# Extracting
# Select the carrier image
s_prime = steg_img.IMG(image_path=<path of containing hidden payload>)
# Extract the payload
s_prime.extract()

Commandline Usage

  1. To hide a payload in an image: $ steg -c <your image file> -p <your payload>
  2. To extract a payload from a carrier: $ steg -c <your image file>

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

steg-0.1.5.tar.gz (5.6 kB view hashes)

Uploaded source

Built Distribution

steg-0.1.5-py3-none-any.whl (8.5 kB view hashes)

Uploaded py3

Supported by

AWS AWS Cloud computing Datadog Datadog Monitoring Facebook / Instagram Facebook / Instagram PSF Sponsor Fastly Fastly CDN Google Google Object Storage and Download Analytics Huawei Huawei PSF Sponsor Microsoft Microsoft PSF Sponsor NVIDIA NVIDIA PSF Sponsor Pingdom Pingdom Monitoring Salesforce Salesforce PSF Sponsor Sentry Sentry Error logging StatusPage StatusPage Status page